Building an Attack Tree for Analysis of Information Security Risks

U.V. Kuzmina, O. Kazakov, Bogdan Erushev
{"title":"Building an Attack Tree for Analysis of Information Security Risks","authors":"U.V. Kuzmina, O. Kazakov, Bogdan Erushev","doi":"10.1109/SmartIndustryCon57312.2023.10110738","DOIUrl":null,"url":null,"abstract":"With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.
构建面向信息安全风险分析的攻击树
在经过深思熟虑的信息安全威胁模型的帮助下,您可以开发基于当前威胁的保护计划。创建用于评估企业资产保护状态的最有效系统的任务是建模的主要目标之一。它们暗示了信息安全概念的普遍性。您应该使用此过程的各种方法,并具有必要的视角和足够的详细程度来描述威胁模型。使用所有可能的威胁实现的方法以树或攻击图(GAT)的形式构建,并验证其属性。威胁、连接及其参数的集合由资产所有者和信息安全专家确定。由于使用了这样的数据集和所描述的结构,消除了具有完全重叠的安全模型中的缺点成为可能。在本文中,我们描述了一个软件应用程序的创建,用于自动化和形式化评估信息系统资产的信息安全性和信息系统安全瓶颈的本地化的过程。该应用程序的一个显著特点是使用俄罗斯FSTEC的威胁数据库来模拟攻击树。FSTEC是俄罗斯信息安全领域的国家监管机构。开发的软件应用程序简化了信息系统安全评估过程,节省了时间,并使威胁建模过程可视化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信